Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-05-2024 15:42

General

  • Target

    dffc83be30add96232b3b63c25cbfc4874904cd04fd2658d0ecd5979a7caa40a.exe

  • Size

    479KB

  • MD5

    1f9ac4a621d3726993ba2f185215879a

  • SHA1

    e412c6fce79cee62a7b2c806be2c85c1386010a1

  • SHA256

    dffc83be30add96232b3b63c25cbfc4874904cd04fd2658d0ecd5979a7caa40a

  • SHA512

    9d6dba40bcb85fa4209ac33f45c1c2b36e714a3438827f45effb3fce1f8110e2b015ee5d6df9d80afa9baced1af0dd486e14ff6cd2c30cbf67d9e705f6802be1

  • SSDEEP

    12288:RMriy90lIiKadmmqiVkFpziI3NM0oPiiimcr:DyEZKIzoZNM0oPii/W

Malware Config

Extracted

Family

redline

Botnet

dimas

C2

185.161.248.75:4132

Attributes
  • auth_value

    a5db9b1c53c704e612bccc93ccdb5539

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dffc83be30add96232b3b63c25cbfc4874904cd04fd2658d0ecd5979a7caa40a.exe
    "C:\Users\Admin\AppData\Local\Temp\dffc83be30add96232b3b63c25cbfc4874904cd04fd2658d0ecd5979a7caa40a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6764497.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6764497.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:112
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k4110454.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k4110454.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1584
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4715928.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4715928.exe
        3⤵
        • Executes dropped EXE
        PID:2292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6764497.exe

    Filesize

    307KB

    MD5

    12592ef02a0a48445396dddaf91aee0a

    SHA1

    e8296de6882bdb50624b825fbde434ad4a991804

    SHA256

    b1bd17b0e046bec70c0b94d5cb6e46b39d031f5acc9dc26fa2740b13af75812a

    SHA512

    9655d14e85c2ba788a935a2d9029f3c25ab0410e6ab778a52b8369f017652b50a25474c8f981753876e43b6d168f477ce04f916703d7088286c7aa77262e3b3b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k4110454.exe

    Filesize

    185KB

    MD5

    3e630811e041742e84b8ea3e59c277d1

    SHA1

    8a9c6d88e0d8ce0bd9e03658fa832d238a5eccd1

    SHA256

    960b92763e28e9b1ff62f7b8774351557c3abbf50adf9255ab5767b2851dd20b

    SHA512

    8d8c4d270f3c4ed32a0dbd0d07e5bd67c8cee508870a8b0a814b17e3c6255e9439054b62cde1d9b293ac50ab37fc10c63cdeccb33f65e6197fd5e7327432685e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4715928.exe

    Filesize

    145KB

    MD5

    8db0f10af9ce05079ff035fa7cf73c32

    SHA1

    0bdec117579e905f21013f7fd0a9ec6532e8cc16

    SHA256

    655e588b3f08e12286257b63c7b283c7ae12076473de7c22a8a327ca80fd50c7

    SHA512

    41be1385b8febcc577c3ab6eee8baa644e6451286e66b840710dc381ca51be0500b780840423c3e8051795a9d31820a7d59f6f035d6501ab0e46e61f26abd7b9

  • memory/1584-36-0x0000000002450000-0x0000000002467000-memory.dmp

    Filesize

    92KB

  • memory/1584-19-0x0000000005110000-0x00000000051A2000-memory.dmp

    Filesize

    584KB

  • memory/1584-34-0x0000000002450000-0x0000000002467000-memory.dmp

    Filesize

    92KB

  • memory/1584-18-0x0000000002450000-0x000000000246C000-memory.dmp

    Filesize

    112KB

  • memory/1584-30-0x0000000002450000-0x0000000002467000-memory.dmp

    Filesize

    92KB

  • memory/1584-20-0x00000000741F0000-0x00000000749A0000-memory.dmp

    Filesize

    7.7MB

  • memory/1584-32-0x0000000002450000-0x0000000002467000-memory.dmp

    Filesize

    92KB

  • memory/1584-48-0x0000000002450000-0x0000000002467000-memory.dmp

    Filesize

    92KB

  • memory/1584-46-0x0000000002450000-0x0000000002467000-memory.dmp

    Filesize

    92KB

  • memory/1584-44-0x0000000002450000-0x0000000002467000-memory.dmp

    Filesize

    92KB

  • memory/1584-43-0x0000000002450000-0x0000000002467000-memory.dmp

    Filesize

    92KB

  • memory/1584-21-0x0000000002450000-0x0000000002467000-memory.dmp

    Filesize

    92KB

  • memory/1584-38-0x0000000002450000-0x0000000002467000-memory.dmp

    Filesize

    92KB

  • memory/1584-15-0x00000000021B0000-0x00000000021CE000-memory.dmp

    Filesize

    120KB

  • memory/1584-17-0x0000000004A60000-0x0000000005004000-memory.dmp

    Filesize

    5.6MB

  • memory/1584-16-0x00000000741F0000-0x00000000749A0000-memory.dmp

    Filesize

    7.7MB

  • memory/1584-40-0x0000000002450000-0x0000000002467000-memory.dmp

    Filesize

    92KB

  • memory/1584-28-0x0000000002450000-0x0000000002467000-memory.dmp

    Filesize

    92KB

  • memory/1584-26-0x0000000002450000-0x0000000002467000-memory.dmp

    Filesize

    92KB

  • memory/1584-24-0x0000000002450000-0x0000000002467000-memory.dmp

    Filesize

    92KB

  • memory/1584-23-0x0000000002450000-0x0000000002467000-memory.dmp

    Filesize

    92KB

  • memory/1584-50-0x00000000741F0000-0x00000000749A0000-memory.dmp

    Filesize

    7.7MB

  • memory/1584-14-0x00000000741FE000-0x00000000741FF000-memory.dmp

    Filesize

    4KB

  • memory/2292-54-0x00000000004A0000-0x00000000004CA000-memory.dmp

    Filesize

    168KB

  • memory/2292-55-0x0000000005410000-0x0000000005A28000-memory.dmp

    Filesize

    6.1MB

  • memory/2292-56-0x0000000004F70000-0x000000000507A000-memory.dmp

    Filesize

    1.0MB

  • memory/2292-57-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

    Filesize

    72KB

  • memory/2292-58-0x0000000004F10000-0x0000000004F4C000-memory.dmp

    Filesize

    240KB

  • memory/2292-59-0x0000000005080000-0x00000000050CC000-memory.dmp

    Filesize

    304KB